Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
0f9d0c041c81d99c0772ae2d9a21a0f3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f9d0c041c81d99c0772ae2d9a21a0f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0f9d0c041c81d99c0772ae2d9a21a0f3_JaffaCakes118.html
-
Size
94KB
-
MD5
0f9d0c041c81d99c0772ae2d9a21a0f3
-
SHA1
c4f12da0c67f6bd7b0124cb54fa674ff20896ec5
-
SHA256
aa8cac33e4161e9576ac740dd0cb63009babca51e15141e3716fcf8db3ecbddb
-
SHA512
8da40a4a374d54c225bb30248ce01aad0a5efeb2a63c78a7d1e4c7c852b93879d53703626d6cac83a6bdb74263bac31f8deada34b46f647658a443ce3defc554
-
SSDEEP
1536:WMLiNYfcEJQD3UN7L24/3FLofAyvI4f9Zqy6rQWBdkrY8mgHC+qpEyW:WAiil1BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008cb1520cb974eaa7c29cc8ef5de88c8c24ab07572b61d7ff1fc04c878be38f68000000000e8000000002000020000000bc6f42e5555880ae68a3242bd17fddce99ad0466908c68c808dded3e042f835f20000000676610cbd09de15dbd23737eabf752270fc6c904663c246e1eba9352062334ac4000000032333127e5e1fabcdfff42a564b67a3c3e89b7033d3b4cd2a475c67f833108bad00f054b20937dca04fb8d135f84c396103569791daa9495b57f15a9f0245fc9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ef86b74873886e6b6d0ba82e8c3edfc0051569a3e518e2e2585106e8ebc0bf24000000000e8000000002000020000000899028309c0b2ec8958cba6054241689a7c2df1c4c91975f4b47ad3cf978950990000000e54400a005044845d79465a4cea8f0c7456d3bbb430938531bd8c5b85fbba874925fbc71ed077bc89672693856e3e21c2955df8ead753c47ec1490a5a204aa4aa2e8ac499569d9ed1c528497a1f0065f518da512ebfbd81b82fef617ff770b9f7ac50f689c0622581d788f1ba0dc83ee7bdd3c2259c6037dd327c8dbddf59eaa09e508ec0544f9ee4257acaa9963f33240000000d35ca7bf82119fc87e8f48ed61202591d2a4e3d33c62e801d8c68b3cbc76d7d353d0b82c53508a66da13dbf85b7ed6e91d495c623ee10829dbc678d5d97fd3f7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420870369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ece0c10d9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA9F86E1-0900-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28 PID 3068 wrote to memory of 1720 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f9d0c041c81d99c0772ae2d9a21a0f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c81fa00a0d2d9437a37330ccaef848
SHA1eb18283c83815f32a739c01bc6154e6b6add5fd1
SHA256e865232ac2e9e61473a6300b8c02ed2556fb02e2550f13699d4aaa925fa2ada7
SHA51285dc29b7041ce1a74649b646bdfed305cb9caf5f82a47f7c571695bdcc406e176cefe19c6ec355a61c758c6a667af11fac05a2cd7cf143c34aaf9bbbd1310673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534940620edd2dda31a70767f44d6a7b8
SHA1fa8e31646b99f86096ffd9eb23f2833c1f8fa9f4
SHA25624371607af53a21cd729f9b932355757f004558d19a9ab7c67b4bf44ae45f544
SHA512b0d6faef0db95c9581ce5446d714ee43cbfc8fee3d5e645883b850f147437b05a3770eb681eb6a7af8d9ca510601c22a02f8c20431d2a652b7dd13868fe2f120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d055b6bd3ba9eb68e7d300354a1b3cc9
SHA140d99ffc740daa3b73e1927ddfb3460c1c510831
SHA256b315b691a4ea3f3bdbe3829e16d8afe9b2c3daf2de9f43f1711bf3b0a5641676
SHA5120aa2429c67bcf07372c4bf991d973532126d6ac66ade0e10f98350d6a8ebf3adac40601e0eb0fc70f09137680e4a081716b6dae7b2c7b5f591d941aa85d6057e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d9a0503c9e2252f733d5e7bfb37f3f
SHA1b73989d215ea819afe74ea273e9d544776b27e26
SHA256c7c168f170673d1cce134bff6985d562a2b17d2eab3a471cb80e46ba401cae3f
SHA512f73aab1148d9ca617804f55888b1f8aab921881b10301e659dac9de2cd32f9c3c2cabc92bbbd456220392d517c406077be6b4480b170d11fb943d00cbb844796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55116dd0da88c1b788cb477f848ff0b6a
SHA1063dd93d013127e07608513d001b77bb662784ed
SHA256c8be8da839da70ee8158e0db14dca2dae1f870479123679ac47b521b22910e21
SHA512a5b806fb7b3083dc1cc264f567566a1149bc509d9decef30ff564e543d559e1bef7884c58ccb36bc44ce43a98cad1753f3cd44a7c9460abe3eaa9e2289f9c0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d44a4c94bf94183372e29bf99fbcdce
SHA13d2b652fd63976aef21c910724863d5276b44c30
SHA2566dac8e7d0fa2c306c032ad5f9e67de99d475664e2360ecbfdca9f48511fd910e
SHA512cec0eb1504da58fc63ee372725098ba968302714e54ac422460c7fdcdd4f0af6ac852bb76bd979279bd128fe370b3101175cb93011108886ae772316260a187e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575014b8667f84975e5b5401f9c4d967e
SHA1100718c0542097bc1f150048ad492062d90172ae
SHA2561f24eb490f3262475c1a2d782fcbff6820d252c4605926e56143f2f4da44f28d
SHA5123789f3b1710c3e519bfdc2722bfd2a38fce5f8ea0893b01d631f721683b39795dd3b50e88e8d47e4d165679e5f651630a2d40cbaf5f51839ba929701164390f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77d2d06233e8960676b8460d9d2edf1
SHA17605baa06dd545ce4d5fe4097e16ebd6eb4190ef
SHA256ed793c3869a0a863ad53b73d39afe6079add637f72805bbfd77b6b844e8c2861
SHA5126bb995f7333dd311004230617b673a9c8d3fc332841ac56034dac0ca06ca6a246e5c313ea620f241ff90b3766087357f20ee490bbef2bcadf051520aff1dbf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4061c032868f4ecf06e61ec52380b6
SHA1b76e1617b00d24ee9216dace563c75f12249fce2
SHA256794354129cc6845db2c645005c34a617a9fe676151fa29251d39cf38f3390bd5
SHA51230983e6e443d9188ee234f0f7e2db8927444bd82c8a9a5f1f99d103aa1a873ca72cffe853cffc740437b5a3efa2aa4dd78d4f0a30638a9db023333019fdb968d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a02ac554b810c06789896f9c2a6d6057
SHA10de60e65ef4f38f454de13b6525ea0f5d5da6a03
SHA2568baa900562c307edf243e800948978264c54f8195aab09a2763f415d1c1e1342
SHA512ae455e5f58e1278f755fcb65dbfc06555db7c68a07b46441fd9f0a4d40972e1e6d57a6dd635d35c738ec32ebddbbf8fef81e4fe68b8f1f8f78e2864a33c3ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8e0b820d0a6fde26d9afb800f1e301
SHA12f202242d8333b3d964099f198fd2e8931e072c4
SHA2563dad4e81cb3a0ab71976a30373ddbd2df53e657b18a2146732642a7dde33635c
SHA5124b7c26f8228fa0574a47955babf8f97a5a5e169a5ddeecee8b0e0281f67f6a55f91e1a245d228948050aca08a2d2070c329240bcf6bec8a1b9cef8d9bf58b3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff53d0eec462806a6b1df136df0f689
SHA1482c2d9cb6069b61d32f26eba0d3c5b8b8aec0cb
SHA2560a6d512c30552406a3ac53314ad451c1db9fe2c0dc5a5cf3800910deb5deac52
SHA512ab1a5eca80640c6b35c4543a75789e644c8f01649f8c8e6a3f59a0e60b4a241a1130b7cc5c58ed72666b2637ce443b2b4d1cfc145326a324fdea651162ef9a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f26f2443f7609dcefcff2531d71352f1
SHA1454bb0e5f98b0d0a7cb1dcc5deac32cbe4bf9d48
SHA25664bccf38dd3d1f452f717724c7392ef7f2315efe97b14b2ead4bad18df5dbc25
SHA512008d19544a609aafbe31cc8d21fbfb231cb8225256f3bb6d1f6408062895507f88bd78546a94d3f1a2ea4974c1cc0c839fc4388dd2853e7840bc1e742ce432d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd33eecf1581baf1cec6058e38649797
SHA14e07ab51a61545fb4ca4aeb37f32488e622170f0
SHA2566576c01630ae5fdac036e73aa57829558bba0de41b299b8f05d8cfc7424c4666
SHA512d1abbda3b2ecde03ed5bfd327c5e12a3142c1daeb7d932edda817c99e84d0425a93873d3828a7365216ce836dfa1b0f77fe1f1e33abd3579c999b46ce80f9546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03d0cd1b0524b0ed6a24aa609505c58
SHA14545abab865c051a732be0b94a562171408d1201
SHA256640d1ec178a5c9cb9a2547f232c07073b499ed1d246f6643e1a791d5c0eb3bd3
SHA5123e67b3f082adbbdd9d7d55723987a560da532bec762808181056483d5476a8ed401a19298abc455f0e01e4b73e89f8b2798b211b878db3410d0a6590a1a819c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5933556d62cdd428842959b8c064644b4
SHA1d8db458cbddc9fd8b664039499bc6c52dce4258e
SHA256b5035a3bd8cf2ba0d8ca603938aed3ed5651a5ce01aa0b32e5a3e00ee0e8e5ae
SHA512f4476ba456799d55f13d364c5a035596d8acee0b0dcc4152c2579132c95ca057d82287dc2bdce4efb56183cb205079eb5c056e49b46b804b000598844683aa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6d7ab76c7b25ca30481696df5b934f
SHA1150ccdd0368839ce17a8f3cdc0d12f613fd2a629
SHA256b843856a8467cf801ff9bd28ab8d09b0f85375feb44543585b13dd7400c4e2ef
SHA5124f72d75920014d2bb02f26a9e156301ec00201aa572aaa1196ffabfb8b79c02ec921c66002be006448c0e7ed97524b66a7704cbaaf397e42eb562953ff946efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59abb17b4541aeac88d889069b017f6a0
SHA1bbf288ccfaafdd6494e152f6751d26436ab210fd
SHA256d020bf173fe006072a5429d5df0b27cebd6838063ebc6b24c6c7349490421c49
SHA512292a3f63092ba882988495d4afd0d23c29cb1df7ffbb8a3d1689a91c7ef4f5638af82bf67e5a4d466cc6d04e0c9832cbf410018e993aa790e3b5e014910756c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\075-GAZO-icon-400x300[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a